News

To make a public and private key pair, your computer generates a very large (“unguessable”) random number from which the gpg software will create for us a private key, and from that, a public ...
Here's my (hopefully simple) problem. I've been using GPG for a while now and I have my keyring on my laptop. At work today, we decided to create a "corporate key" to encrypt a few files (mostly ...
It also does not affect the ability to decrypt messages sent to Alice in the past if she still has the key. alice@wonderland ~ $ gpg -a --gen-revoke [email protected] ...
What you really need to do is secure that private document with encryption. I'm going to show you how it's done on the three main desktop operating systems: Linux, MacOS, and Windows.
You can now easily send encrypted mail to contacts with associated public GPG keys, and decrypt incoming mail from contacts that have your GPG public key. It’s easy, secure, and reliable.
Decades-old PGP bug allowed hackers to spoof just about anyone’s signature SigSpoof flaw fixed in GnuPG, Enigmail, GPGTools, and python-gnupg.
It’s of interest to note that public and private key cryptography is not only used for encryption and decryption, but also used for the verification of digital signatures — used in Bitcoin ...